S Kim, D Hong, J Sung, S Hong - Cryptology ePrint Archive, 2022 - eprint.iacr.org
In this study, we accelerate Matsui's search algorithm to search for the best differential and linear trails of AES-like ciphers. Our acceleration points are twofold. The first exploits the …
M de Ree, G Mantas, J Rodriguez… - 2021 IEEE 26th …, 2021 - ieeexplore.ieee.org
The conventional solution for providing data confidentiality is by means of encryption (a branch of cryptography). However, encryption schemes are generally designed to provide a …